{"id":154582,"date":"2022-06-10T10:14:41","date_gmt":"2022-06-10T17:14:41","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=154582"},"modified":"2023-07-12T09:48:14","modified_gmt":"2023-07-12T16:48:14","slug":"instagram-credentials-stealers-free-followers-or-free-likes","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/","title":{"rendered":"Instagram credentials Stealers: Free Followers or Free Likes"},"content":{"rendered":"<p><span data-contrast=\"none\">Authored by Dexter Shin<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Instagram has become a platform with over a billion monthly active users. Many of Instagram&#8217;s users are looking to increase their follower numbers, as this has become a symbol of a person&#8217;s popularity.\u00a0 Instagram\u2019s large user base has not gone unnoticed to cybercriminals. McAfee&#8217;s Mobile Research Team recently found new Android malware disguised in an app to increase Instagram followers.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">How can you increase your followers or likes?<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">You can easily find apps on the internet that increase the number of Instagram followers. Some of these apps require both a user account and a password. Other types of apps only need the user to input their user account. But are these apps safe to use?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_154583\" aria-describedby=\"caption-attachment-154583\" style=\"width: 906px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-154583 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/sus-apps.png\" alt=\"Figure 1. Suspicious apps in Google Images\u00a0\" width=\"906\" height=\"559\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/sus-apps.png 906w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/sus-apps-300x185.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/sus-apps-768x474.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/sus-apps-205x126.png 205w\" sizes=\"auto, (max-width: 906px) 100vw, 906px\" \/><figcaption id=\"caption-attachment-154583\" class=\"wp-caption-text\">Figure 1. Suspicious apps in Google Images<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">Many YouTubers explain how to use these apps with tutorial videos. They log into the app with their own account and show that the number of followers is increasing. Among the many videos, the domain that appears repeatedly was identified.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The way the domain introduces is very simple.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Poppins\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:760,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Log in with user account and password.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Poppins\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:760,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Check credentials via Instagram API.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Poppins\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:760,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">After logging in, the user can enjoy many features provided by the app. (free followers, free likes, unlimited comments, etc.)<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Poppins\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:760,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">In the case of free followers, the user needs to input how many followers they want to gain.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ol>\n<figure id=\"attachment_154597\" aria-describedby=\"caption-attachment-154597\" style=\"width: 362px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-154597 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/follower.png\" alt=\"Figure 2. A screenshot to increase the number of followers by entering in 20 followers. \" width=\"362\" height=\"756\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/follower.png 362w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/follower-144x300.png 144w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/follower-62x129.png 62w\" sizes=\"auto, (max-width: 362px) 100vw, 362px\" \/><figcaption id=\"caption-attachment-154597\" class=\"wp-caption-text\">Figure 2. A screenshot to increase the number of followers by entering in 20 followers.<\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW231379190 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231379190 BCX0\">When you run the function, you can see that the number of followers increase<\/span><span class=\"NormalTextRun SCXW231379190 BCX0\">s<\/span><span class=\"NormalTextRun SCXW231379190 BCX0\"> every few seconds.<\/span><\/span><span class=\"EOP SCXW231379190 BCX0\" data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_154611\" aria-describedby=\"caption-attachment-154611\" style=\"width: 905px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-154611 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/new-follow.png\" alt=\"Figure 3. New follower notifications appear in the feed. \" width=\"905\" height=\"466\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/new-follow.png 905w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/new-follow-300x154.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/new-follow-768x395.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/new-follow-205x106.png 205w\" sizes=\"auto, (max-width: 905px) 100vw, 905px\" \/><figcaption id=\"caption-attachment-154611\" class=\"wp-caption-text\">Figure 3. New follower notifications appear in the feed.<\/figcaption><\/figure>\n<h2><b><span data-contrast=\"auto\">How does this malware spread?<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Some Telegram channels are promoting YouTube videos with domain links to the malware.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_154625\" aria-describedby=\"caption-attachment-154625\" style=\"width: 907px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-154625\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/telegram.png\" alt=\"Figure 4. Message being promoted on Telegram \" width=\"907\" height=\"626\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/telegram.png 907w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/telegram-300x207.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/telegram-768x530.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/telegram-187x129.png 187w\" sizes=\"auto, (max-width: 907px) 100vw, 907px\" \/><figcaption id=\"caption-attachment-154625\" class=\"wp-caption-text\">Figure 4. Message being promoted on Telegram<\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW183418482 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW183418482 BCX0\">We have also observed a video from a famous YouTuber with over 190,000 <\/span><span class=\"NormalTextRun SCXW183418482 BCX0\">subscribers promoting <\/span><span class=\"NormalTextRun SCXW183418482 BCX0\">a <\/span><span class=\"NormalTextRun SCXW183418482 BCX0\">malicious app.<\/span> <span class=\"NormalTextRun SCXW183418482 BCX0\">However, in the video, we found some concerning comments with people complaining that their credentials were being stolen.<\/span><\/span><span class=\"EOP SCXW183418482 BCX0\" data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-154653\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm1.png\" alt=\"\" width=\"902\" height=\"260\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm1.png 902w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm1-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm1-768x221.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm1-205x59.png 205w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/p>\n<figure id=\"attachment_154639\" aria-describedby=\"caption-attachment-154639\" style=\"width: 902px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-154639\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm2.png\" alt=\"\" width=\"902\" height=\"179\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm2.png 902w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm2-300x60.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm2-768x152.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/comm2-205x41.png 205w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><figcaption id=\"caption-attachment-154639\" class=\"wp-caption-text\">Figure 5. Many people complain that their Instagram accounts are being compromised<\/figcaption><\/figure>\n<h2><b><span data-contrast=\"auto\">Behavior Analysis in Malware<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">We analyzed the application that is being promoted by the domain. The hidden malware does not require many permissions and therefore does not appear to be harmful. When users launch the app, they can only see the below website via the Android Webview.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-154667 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll.png\" alt=\"\" width=\"368\" height=\"754\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll.png 368w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll-146x300.png 146w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll-63x129.png 63w\" sizes=\"auto, (max-width: 368px) 100vw, 368px\" \/><\/p>\n<figure id=\"attachment_154681\" aria-describedby=\"caption-attachment-154681\" style=\"width: 368px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-154681\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll2.png\" alt=\"\" width=\"368\" height=\"754\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll2.png 368w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll2-146x300.png 146w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/free-foll2-63x129.png 63w\" sizes=\"auto, (max-width: 368px) 100vw, 368px\" \/><figcaption id=\"caption-attachment-154681\" class=\"wp-caption-text\">Figure 6. Redirect to malicious website via Android Webview<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">After inspecting the app, we observe the initial code does not contain many features. After showing an advertisement, it will immediately show the malicious website. Malicious activities are performed at the website&#8217;s backend rather than within the Android app.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_154695\" aria-describedby=\"caption-attachment-154695\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-154695\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/code.png\" alt=\"Figure 7. Simple 2 lines of initial code \" width=\"696\" height=\"109\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/code.png 696w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/code-300x47.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/code-205x32.png 205w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-154695\" class=\"wp-caption-text\">Figure 7. Simple 2 lines of initial code<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">The website says that your transactions are carried out using the Instagram API system with your username and password. It is secure because they use the user&#8217;s credentials via Instagram&#8217;s official server, not their remote server.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Contrary to many people&#8217;s expectations, we received abnormal login attempts from Turkey a few minutes after using the app. The device logged into the account was not an Instagram server but a personal device model of Huawei as LON-L29.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_154709\" aria-describedby=\"caption-attachment-154709\" style=\"width: 907px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-154709\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/fake-login.png\" alt=\"Figure 8. Abnormal login attempt notification \" width=\"907\" height=\"528\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/fake-login.png 907w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/fake-login-300x175.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/fake-login-768x447.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/fake-login-205x119.png 205w\" sizes=\"auto, (max-width: 907px) 100vw, 907px\" \/><figcaption id=\"caption-attachment-154709\" class=\"wp-caption-text\">Figure 8. Abnormal login attempt notification<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">As shown above, they don&#8217;t use an Instagram API. In addition, as you request followers, the number of the following also increases. In other words, the credentials you provided are used to increase the number of followers of other requesters. Everyone who uses this app has a relationship with each other. Moreover, they will store and use your credentials in their database without your acknowledgement.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">How many users are affected?<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The languages of most communication channels were English, Portuguese, and Hindi. Especially, Hindi was the most common, and most videos had more than 100 views. In the case of a famous YouTuber&#8217;s video, they have recorded more than 2,400 views. In addition, our test account had 400 followers in one day. It means that at least 400 users have sent credentials to the malware author.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Conclusion<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">As we mentioned in the opening remarks, many Instagram users want to increase their followers and likes. Unfortunately, attackers are also aware of the desires of these users and use that to attack them.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Therefore, users who want to install these apps should consider that their credentials may be leaked. In addition, there may be secondary attacks such as credential stuffing (=use of a stolen username and password pairs on another website). Aside from the above cases, there are many unanalyzed similar apps on the Internet. You shouldn&#8217;t use suspicious apps to get followers and likes.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee Mobile Security detects this threat as Android\/InstaStealer and protects you from this malware. For more information, visit <\/span><a href=\"https:\/\/www.mcafeemobilesecurity.com\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee Mobile Security<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Indicators of Compromise<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">SHA256:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:760,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">e292fe54dc15091723aba17abd9b73f647c2d24bba2a671160f02bdd8698ade2<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:760,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">6f032baa1a6f002fe0d6cf9cecdf7723884c635046efe829bfdf6780472d3907<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Domains:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:760,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">https[:\/\/]insfreefollower.com<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Dexter Shin\u00a0 Instagram has become a platform with over a billion monthly active users. Many of Instagram&#8217;s users&#8230;<\/p>\n","protected":false},"author":695,"featured_media":154737,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[15921],"coauthors":[4136],"class_list":["post-154582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-insagram"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Instagram credentials Stealers: Free Followers or Free Likes | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Dexter Shin\u00a0 Instagram has become a platform with over a billion monthly active users. Many of Instagram&#039;s users are looking to increase their\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Instagram credentials Stealers: Free Followers or Free Likes | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Dexter Shin\u00a0 Instagram has become a platform with over a billion monthly active users. Many of Instagram&#039;s users are looking to increase their\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-10T17:14:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-12T16:48:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Instagram credentials Stealers: Free Followers or Free Likes\",\"datePublished\":\"2022-06-10T17:14:41+00:00\",\"dateModified\":\"2023-07-12T16:48:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/\"},\"wordCount\":871,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg\",\"keywords\":[\"insagram\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/\",\"name\":\"Instagram credentials Stealers: Free Followers or Free Likes | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg\",\"datePublished\":\"2022-06-10T17:14:41+00:00\",\"dateModified\":\"2023-07-12T16:48:14+00:00\",\"description\":\"Authored by Dexter Shin\u00a0 Instagram has become a platform with over a billion monthly active users. Many of Instagram's users are looking to increase their\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Instagram credentials Stealers: Free Followers or Free Likes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Instagram credentials Stealers: Free Followers or Free Likes | McAfee Blog","description":"Authored by Dexter Shin\u00a0 Instagram has become a platform with over a billion monthly active users. Many of Instagram's users are looking to increase their","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Instagram credentials Stealers: Free Followers or Free Likes | McAfee Blog","og_description":"Authored by Dexter Shin\u00a0 Instagram has become a platform with over a billion monthly active users. Many of Instagram's users are looking to increase their","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-06-10T17:14:41+00:00","article_modified_time":"2023-07-12T16:48:14+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Instagram credentials Stealers: Free Followers or Free Likes","datePublished":"2022-06-10T17:14:41+00:00","dateModified":"2023-07-12T16:48:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/"},"wordCount":871,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg","keywords":["insagram"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/","name":"Instagram credentials Stealers: Free Followers or Free Likes | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg","datePublished":"2022-06-10T17:14:41+00:00","dateModified":"2023-07-12T16:48:14+00:00","description":"Authored by Dexter Shin\u00a0 Instagram has become a platform with over a billion monthly active users. Many of Instagram's users are looking to increase their","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_tiktok-1.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Instagram credentials Stealers: Free Followers or Free Likes"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/154582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=154582"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/154582\/revisions"}],"predecessor-version":[{"id":171507,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/154582\/revisions\/171507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/154737"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=154582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=154582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=154582"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=154582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}